Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Cryptology
Book Two
Dr. M. MRAYATI
Said M. al-Asaad
Revised by
Marwan al-Bawab
Ousama Rajab
Contents
Vowels:
Arabic characters Transliteration Examples
(fat a) a as u in cup.
Short as o in rock,
( amma) u and u in put.
Vowels
as e in red,
(kasra) i and i in big.
As a in last.
Long
Vowels
ٚ (preceded by ) as oo in moon.
( يpreceded by ) as ee in sheet.
Consonants:
Arabic
Transliteration Examples
characters
' (e.g. 'amr, 'ibr h m, fu' d, kis ' , t ').
ة b as b in back.
د t as t in tea.
س as th in thin.
ط as g in logic.
ػ (e.g. tim).
ؿ (e.g. lid).
ك d as d in day.
م as th in then.
7
ه r as r in red.
ى z as z in zoo.
ً s as s in soon.
ُ as sh in show.
ص (e.g. mi r).
ض (e.g. ir r).
غ (e.g. riq).
ؾ (e.g. fir).
ع (e.g. Abb s).
غ (e.g. lib).
ف f as f in few.
ق q (e.g. qur' n).
ن k as k in key.
ي l as l in led.
َ m as m in sum.
ْ n as n in sun.
٘ـ h as h in hot.
ٚ w as w in wet (e.g. wahab, nawfal).
ي y as ie in orient (e.g. y q t, dunayn r).
Notes:
(t ' marb a): In the absolute state, ignored in transliteration (e.g. mad na); in
the construct state, rendered by (t) (mad nat annab ).
(suk n): Ignored in transliteration.
( adda): rendered by doubling the consonant.
8
Preface
* * *
This book is divided into two chapters, devoting the first chapter
to an analytical study of the edited treatise of ibn Adl n. It aims at
elucidating difficult or vague points, spotting particular features and,
more importantly, highlighting aspects of originality and innovation in
the treatie. It is divided into four sections, the first of which is on
ibn Adl n's biography.
The second section is a full study and analysis of ibn Adl n's
Treatise, while the third section delineates its structure. This section
contains a preface, rules in cryptanalysis, and a conclusion of a
practical example of a real ciphered message, explaining the steps ibn
Adl n follows in cryptanalysing it.
9
In the fourth section we have concluded our analysis of the treatise
by a summary exposing the aspects of ibn Adl n's originality.
* * *
The second chapter comprises the full text of the edited treatise of
ibn Adl n. It opens with a preamble to the editing methodology
adopted (Section 1), which basically conforms to that commonly used
by scholars and the academic community. The treatise is preceded
with a brief description of the manuscript, followed by sample
photocopies of pages from the original (Section 2).
The treatise itself and its English translation represent (Section 3),
with the English translation on the left-hand pages, and the original
Arabic text on the right-hand pages.
The task of editing the manuscript text was a challenge indeed. No
effort has been spared correcting the mistakes and clearing the
confusion.
Special care has been taken to present the text of the treatise in due
form. This includes highlighting ibn Adl n's twenty rules concerning
cryptanalysis, and providing appropriate headings for those which he
did not mark with titles.
Damascus, 2003
Dr. M. Mrayati
Dr. Y. Meer Alam Dr. M. H. Tayyan
10
Chapter 1
11
12
1.1 ibn Adlan's biography
He is Af f ad-D n Al ibn Adl n ibn amm d ibn Al
al-Maw il an-Na w al-Mutar im. He was born in Mosul in AH 583/
AD 1187, received his education in Baghdad, and learnt syntax from a
number of teachers, foremost of whom was Ab al-Baq ' al- Ukbar .
Then he taught the Arabic language for a while and had many
students. He had his class in a - li Mosque in Cairo, where he died
in AH 666/ AD 1268. He was well-known for his intelligence and was
considered a leading figure in literature, besides being a great poet.
Perhaps all of these traits qualified him to be expert at riddles and
cryptanalysis, in which he excelled and for which he dedicated more
than one book.
His works
ibn Adl n's life spanned more than eight decades, during which he
was known for his scintillating wit, his eminence in syntax, and
ingenuity in cryptanalysis. Yet, he turned out very little writing;
sources have cited no more than three books attributed to him. There
are reasons to believe that these sources have certainly skipped some
of his works. For example there was a reference by ibn Adl n in the
twentieth rule of his treatise al-Mu'allaf lil-malik al-'A raf to the
tables included in his book al-Mu lam, regarding algorithms for the
cryptanalysis of a cryptogram containing symbols which are greater or
less in number than the letters of the alphabet.
ibn Adl n has left the following works:
1. al-'inti b lika f al-'aby t al-mu kilat al-'i r b.
2. uqlat al-mu t z f all al-'al z.
3. al-Mu'allaf lil-malik al-'A raf.
4. al-Mu lam.
13
1.2 Study and analysis of ibn Adlan's treatise
al-mu'allaf lil-malik al-'Asraf
1
See his treatise, p. 40.
2
Ibid., pp. 38-40.
3
Ibid., p. 112.
14
1.3 Structure of the treatise
ibn Adl n divides his treatise into a preface, twenty rules, and a
conclusion. In the interest of facilitating analysis, and clustering topics
of a kind together, we shall break it up into three sections, each of
which is composed of several related topics:
1: Preface, which consists of the following three topics:
1) Cryptanalyst's tools.
2) Examples of encipherment by simple substitution.
3) A study in letter combination for building the Arabic word.
2: Rules in cryptanalysis, which consists of 20 rules that can be
grouped into nine topics, namely:
1) Analytical method for cryptanalysis (Rules 1, 2 and 3).
2) Extracting the "space" (Rule 4).
3) Cryptanalysing the definite article (al )ايand adjacent letters
(Rules 5, 6, and 7).
4) The probable word (Rule 8).
5) The utilization of initial and final letters of words (Rules 9
and 10).
6) The use of double letters or double bigrams (Rules 11, 13,
14, and 15).
7) Cryptanalysing no- word-spacer cryptograms (Rule 12).
8) Cryptanalysing enciphered poetry (Rules 16 and 17).
9) Summary and helpful tips (Rules 18, 19, and 20).
3: Conclusion, which revolves around a single topic, namely practise
and exercise through a practical model example.
1.3.1 Preface
In his preface, ibn Adl n addressed the following three significant
topics:
1. Cryptanalyst's tools:
These are the essential tools considered to be indispensable to the
cryptanalysis, and are mentioned by ibn Adl n in the following detail:
a) Intelligence and perspicacity.
b) Dynamism.
c) Thorough knowledge of language, syntax, morphology, and
structures used.
15
d) Prosody and rhyme.
e) Frequency of letter occurrence, association and dissociation.
f) Frequency of two-letter and three-letter words in particular.
g) Word spacers.
h) Honorary titles and opening statements (Probable words).
i) Practice and exercise.
j) Familiarity with the numerous methods of encipherment.
2. Examples of encipherment by simple substitution:
ibn Adl n reported, in broad outline, some of the methods of
encipherment, describing simple substitution as: "You inscribe the
plain letters of any language, under which you draw agreed signs.
Using these signs, you then write"4. At this point he elaborated an
issue more fully than al-Kind before him; namely, "space" (al-fa l).
Moreover, he set the term "no- word-spacer" (al-mudma ) to mean
encipherment without the use of space, i.e. absence of symbols
functioning as indicators of spaces between words.
ibn Adl n proceeds to consider the method of simple substitution
(monoalphabetic), citing in each of the following two verses the
Arabic alphabet in such a way as to avoid the repetition of any letter:
1
2
The one represents the alphabet as being made up of 29 letters
(including ;)الthe other of 28 (excluding )ال. These verses he named
"the regulators" (a aw be )5, or "key" (al-mift ) in today's
terminology, so called because knowing it leads to easily interpreting
ciphertexts. This point has not particularly been mentioned by al-Kind .
ibn Adl n then stated two methods for utilizing these regulators. The
first is by exercising substitution between every couple of letters in
each of the two verses; thus ( كd) is substituted for ( قq), ) ( طfor
) ( ض, and so forth. The other is by substituting for each letter of the
verse one letter of the alphabet respectively in order. It follows, taking
4
See his treatise, p. 42.
5
Ibid., p. 42.
16
the first verse, that ) ( اwould replace ( قq), ( ةb) would replace ( كd),
( دt) instead of ) ( ض, and so on till the end of the alphabet. Likewise,
taking the other verse, ) ( اwould take the place of ) ( ص, ( ةb) the
place of ) ( ػ, etc.
ibn Adl n indicated the existence of other encipherment methods,
and referred his reader to other works, preferring brevity here, as this
compendium would not abide lengthy details. He said: "Examples of
that are available in sources other than this glimpse"6.
3. A study in letter combination for the conformation of the
Arabic word
This is the third topic of the Preface, termed by ibn Adl n
"at-tar k b" (Structures) in which he treated combination of letters in a
word, referring the reader to such principal Arabic dictionaries as
tah b al-'Azhar and Mu kam ibn S da. He did, however, mention the
structure of bigrams and their association and dissociation in anterior
or posterior positions, and he offered worthy examples for no-word-
spacer cryptanalysis that al-Kind had not given before him.
6
See his treatise, p. 44.
7
Ibid., p. 54.
17
in the context of mentioning the case of encipherment in which
several symbols are used for the "space": "Some of those pursuing this
method of cryptography -with several symbols for the space- allege
that their ciphers can defy detection and analysis. I managed to solve
several messages of this type that I was challenged to solve, and also
two other messages intercepted by some kings…"8. Under the
nineteenth rule he also said: "When you are at a loss in solving the
letter ) ( ا, you have wrongly solved it as ( يy), upon which case I
have happened more times than one"9.
In the following paragraphs we shall review the nine topics that
constitute ibn Adl n's twenty rules:
1) Analytical method for cryptanalysis:
Here ibn Adl n explains the utilization of letter frequency of
occurrence in language, and also the frequency of bigrams and
trigrams, as a method for cryptanalysis. This notion has been covered
in three rules. It seems that in respect of stating the order of letter
occurrence he patterned himself upon al-Kind , so that the numbers he
used for letter frequencies were identical with those determined by
al-Kind , although he never makes the slightest allusion to al-Kind .
But what is really original in his treatment of the subject is the
division of letters, as far as their frequency is concerned, into
abundant, common, and scarce letters as follows:
Order of letters Number Letters
Abundant 7
Common 11
Scarce 10
Total 28
Another original aspect in his presentation is offering a table of the
commonest two- and three- letter words. Far more important is his
reference to the consequence of the length of the cryptogram when
8
See his treatise, p. 58.
9
Ibid., p. 102.
18
using the analytical method. As ibn Adl n puts it: "The length of the
text to be cryptanalysed should be at least in the neighborhood of
ninety letters as a rule of thumb, because the letters thus would have
had three rotations. Yet the number of letters may be less than that in
certain cases"10. He reiterates this idea under the twelfth rule: "I said
the cryptogram should be long enough, since in a short one the order
of letter frequency would no longer be applicable"11.
He restricts himself here -in the fourth rule- to offering algorithms for
cryptanalysing both kinds, emphasizing that this is the first step in
cryptanalysis.
10
See his treatise, p. 52.
11
Ibid., p. 80.
12
Ibid., p. 62.
19
how this ties in with " "ايwhen prefixed to it. This, indeed, is another
original aspect in his treatise.
13
See his treatise, p. 66.
14
Ibid., p. 102.
20
the name of God or similar phrases. Accordingly I discovered the first
few letters of the message, which finally yielded to interpretation'.
That was the groundwork of al- al l's book: al-mu amm "15.
15
See abaq t an-Na wiyy n wal-Lugawiyy n, p. 51.
21
carefully, stating the possible times for each character to occur this
way and exemplifying his argument as often as necessary.
16
See his treatise, p. 100.
22
frequently illustrates this algorithm and the progress of its stages by
several examples.
In the nineteenth rule, he offers a practical method for
distinguishing the letter ) ( اfrom the letter ( يy) in case of confusion.
ibn Adl n concludes his rules with a general account, calling
attention to tables included in his al-mu lam. He reiterates his advice
to cryptanalysts, regarding the assumption of the most intricate
possibilities in the process of cryptanalysing a cryptogram, and
eliciting the appropriate meaning for both the occasion and the
context; namely, the use of the probable-word concept. He then moves
to talk about a type of steganography, asserting that he would allocate
a special study to this kind of encipherment. Steganography was later
treated at length by al-Qalqa andy in his book ub al- A 17.
* * *
17
See ub al-'A a, 9/229 on.
23
1.4 ibn Adlan's Originality
The originality of ibn Adl n, and his distinctive attribute in
cryptanalysis have been basically manifested in the following
unprecedented contributions:
1. He presented the treatise in the form of a practical manual rather
than a theoretical book on cryptanalysis; thus advancing the first
cryptanalysis manual in history.
2. He offered the concept of cryptographic "Keys" or what he
called "regulators" (a - aw bi ) in a line of verse functioning as
a "key".
3. He expanded upon manipulating the "space" by publishing a
detailed description of how to solve a monoalphabetic cipher
with no space or word divisions, there centuries before
G.B.Porta (A.D. 1563). In the West Porta has been considered as
the first to write on cryptanalysing the no-word-spacer
cryptograms18. ibn Adl n also treated cryptanalysing
cryptograms using several symbols for the space, or what he
called "the variable space".
4. He divided letters into abundant, common and scarce according
to their frequency of occurrence.
5. He used word lengths and frequencies of letters in the initial and
final positions of words for cryptanalysis. He also emphasized
the use of two-, three-, and four-letter words respectively, giving
data on each of them.
6. He accorded special care to the "probable word" concept.
7. He made good use of double and triple letters…, double bigrams,
and their frequencies.
In short, the information contained in this treatise is in every sense
worthy of consideration. In fact, his manual remains, even after more
than seven centuries, a useful practical guide to any cryptanalyst
today.
18
See David Kahn's The Codebreakers, p. 138.
24
Chapter 2
25
26
2.1 Editing methodology
The main purpose of editing is the reproduction of a text as close to
the author's original as possible. In line with this objective we have
opted for conserving the statement of the original whenever possible.
No effort has been spared in the interpretation of citations
(Koranic verses, Prophetic traditions, lines of poetry,
sayings, etc.) contained in the treatises. We have given brief
biographical identification of personalities, relegating the
interested reader to such authorities as al-A l m by ayr al-
D n al-Zirkily or Mu am al-mu'allif n by Omar Ri
Ka ala, for further and more detailed biographical
reference. Those citations and personalities that our efforts
fell short of their interpretation or identification have also
been properly recorded.
In explaining the linguistic terms included in the treatise we
have made use of various dictionaries, old and modern,
foremost of which are: Lis n al- Arab and Matn al-lu a.
Unless otherwise helpful, no reference has been made to
any dictionary.
We have adopted the same symbols and signs commonly
employed by editors of Arabic manuscripts. We conformed
to the modern spelling norms, and we enclosed requisite
contextual additions -i.e. explanatory insertions and
comments other than the writer's own words- within square
brackets [ ]; examples illustrating rules of encipherment
have been set off by round brackets (parentheses) ( ); book
titles in italics, quoted material and Prophetic traditions
have appeared within quotation marks " ", while floral
brackets have been used to enclose Koranic verses.19
19
Translator's explanatory additions are placed between pairs of hyphens: -…-.
27
2.2 Description of the manuscript
Ibn 'Adl n's treatise, as stated earlier, is one of several treatises
constituting a large assemblage of papers. The aggregate is made up of
(191) medium-sized sheets covering various topics, among which are
treatises on cryptology found between sheet No.(48) to No.(133)
representing all that is in our possession. Ibn Adl n's treatise occupies
the pages 89/A to 107/B, the handwriting of which varies in size, quality
and number of lines. The average number of lines in each page is
something like 14-15 lines. The assemblage copy is in the stock of the
F ti Library, preserved in as-Sulaym niyya Library in Istanbul under
the number 5359. In the summer of 1980, we had the opportunity to view
this manuscript on the premises. It was not our aim to get a photocopy of
it, because we have already had one courteously presented to us by
Mr. 'A mad Ratib al-Naff , who had theretofore received it from his
good friend Dr. Fu' d Sezgin in Germany as a gift. It should be pointed
out that sheet No.74 of the manuscript in our possession, and perhaps in
the original manuscript, is missing.
The following is a list of the titles of treatises included in the
assemblage, arranged in the order of their appearance, with the number of
the first page of each beside the title:
* treatise of Ab al- asan ibn ab ab : f isti r
al-mu amm - On cryptanalysis - 48/A
* Zubad fus l ibn Dunayn r f all at-tar im - Gist of
ibn Dunayn r's chapters on cryptanalysis - 54/A
* Maq id al-fu l al-mutar ima an all at-tar ama
- Designs of expressive chapters on cryptanalysis - 55/A
* From al- urhum 's book 80/A
* From Al-bay n wattaby n by Ab al- usayn Is q
ibn 'Ibr h m ibn Sulaym n ibn Wahab al-K tib 82/A
* From al- urhum 's treatise 83/A
* From al- A book 87/A
* al-Mu'allaf lil-malik al-'A raf on cryptanalysis 89/A
* The first essay on the summary of cryptanalysis 109/A
* The second essay on cryptanalysing abstruse and
ambiguous ciphers 115/A
* A treatise on the cryptanalysis of poetry, extracted
from the book: Adab a u ar ' 119/B
28
(Document No. 5359, as-Sulaym niyya Ottoman Archives, Turkey)
29
A photocopy of the first page of ibn Adl n's treatise
A photocopy of the title-page of ibn Adl n's treatise
(Document No. 5359, as-Sulaym niyya Ottoman Archives, Turkey)
30
A photocopy of the last page of ibn Adl n's treatise A photocopy of the second last page of ibn Adl n's treatise
2.3 al-mu'allaf lil-malik al-'Asraf
on cryptanalysis
(Original Arabic Text and English Translation)
31
al-mu'allaf lil-malik al-'A raf
on cryptanalysis
Made by
The individual nonpareil authority of knowledge
Sheik Af f ad-D n Al ibn Adl n an-Na w
32
In the name of God,
The Compassionate the Merciful
therefrom I take the safest shelter and protection against deceit and
delusion, like a goodly tree: its root set firm, its branches reaching into
sky.
And God's blessing and peace be upon His Prophet whom He hath
who extinguished the fire of hostility and disbelief, and who declared
34
This addressed to our sultan King al-'A raf Mu affar ad-D n M s ,
may God prosper him and guide his steps and guard him from his
typifies the statement of our Prophet, blessing and peace be upon him,
that "a sovereign is the shadow of God and His lance on earth". The
shadow is the haven for the afflicted; the lance the means for charging
enemy.
36
Verse:
under his care and guidance. It is by him that it thrived, and through
came to be the delight of the eye and taste, the center of attraction, and
description of being 'a thing of beauty' and a place for every grace.
and trying to seek a resort of peace, prestige and opulence with you.
38
Verse:
When earnest pain hit me in heart and face,
And life got so barren as death;
A gaunt and bleak blossom of scentless breath,
To thee I turned for help and grace!
The book contains laconical words and choice meanings, which I
made to sound like current sayings, and which would redeem any
prolixity in this concern. I pray God, the All-Hearing and Responsive,
that the king may take pleasure in it and find it suitable to his
purposes.
* * *
My Introduction is based on a preface, rules and a conclusion.
[Preface]
Several factors are needed in cryptanalysing an interpreted text
[cryptogram], such as intelligence, lucidity, alertness, linguistics,
syntax, morphology, idioms, knowledge of prosody and rhymes,
frequency of letter occurrence, combination and non-combination of
letters, knowledge of the most frequently used words and those less
used: two- and three-letter words, familiarity with word spacers and
opening honorary expressions, plenty of practice and exercise that
make perfection, and acquaintance with other numerous methods of
interpretation [ciphering].
40
To encipher, you inscribe the plain letters of any language, under
which you draw agreed signs. Using these signs, you then write
-simple substitution-, adding at the end of each word the sign
indicating a space, when the interpreted text is free from no-word-
spacers. You may encipher without the use of space- i.e. without
utilizing symbols functioning as indicators of spaces between words-.
For example:
42
You may exercise substitution between every pair of letters in each
of the above verses; [thus the letters ( كd) may be substituted for the
letter ( قq); the letter ) ( طfor ) ( ض, and so on]. You may also
substitute for each letter of the verse one letter of the alphabet
You may also wish to make the number of symbols the same as
that of letters, or less, in which case you would have to make up for
this are available in sources other than this glimpse. Various spaces
S da al-Ma rib , An-nasab li a r kal m al- Arab, ibn al- abb n's A -
these structures:
44
Two-letter words have two structures: either placing the second
neither of them; namely, when the last letter of a word meets the first
letter of the next word. For instance, ( اهلل عالGod is supreme). The
لٙع. An example of the other case is ّ ٌُ ٌغط, and ٌُ ٔله أْ ععّٕب: The
letter ) ( ض, but it does in posterior position, as in: َ( ظَظshout). The
posterior position]. We say: ّهعً أعؿ, a man with a dangling upper jaw.
* * *
46
The First Rule
On the Order of Letter Frequency of Occurrence
48
For cryptanalysis, you consider the letters expressed by symbols.
Having found them in accordance with what we have mentioned
above, you expect almost certainly that each order represents a letter.
You then manipulate the symbols, matching them against
corresponding symbols, trying to educe the meaning of the cipher.
Keep on trying until you hit it.
Bigrams are: ( الl ) (written in two forms), ِِْٓ (min), َِْٓ (man), َْإ
(inna), َْ( أanna), ْْ( أan), ( ِبm ), ً( فf ), ٌُ (lam), ٓ ( عan), ( للqad),
(these last two words are equally frequent), ُ٘ (hum), ( إمi ), ُص
( umma), ً٘ (hiya), ٚ( أaw), ٌٛ (law), ( ٌبy ) (the last two words also
have equal chances of frequency), ) ( ما, ً( وkay), ٚ) ( م, َ( ُهةrubba)
(these four words are also equally frequent), ْ( ُِنmu ), َُٓ٘ (hunna), اٚ
(w ) (these three are less frequent; never used in the Holy Koran,
while the other two-letter words are, and their use in oral conversation
as well as in poetry is scarce). Two-letter words like: ًٌ (l ), ( ٌهlaka)
and ٌٗ (lahu) are known through their order of frequency and also
through itself. As to َْيٚ (way), it is of really scarce frequency. It is
mentioned in the Holy Koran, S bawayh argues, in the verse: ََُٗٔيْ وأٚ
َُْٚال ٌُفٍِؼُ اٌىبفِو -=Ah, wellaway! The disbelievers never prosper-. This
argument for the use of يٚ this way is peculiar to S bawayh; other
scholars say otherwise.
The order of two-letter words is the same as they are stated above:
the most frequent is ِِْٓ, then َِْٓ and so on and so forth.
In connexion with three-letter words, they are, in a descending
order of frequency of occurrence, the following: ( إٌىil ), ( عٍىal ), أٔب
(an ), بٌٙ (lah ), بٙ( ثbih ), ( أِّبamm ), ( أَِبam ), ( ٌَّبlamm ), '( إماi ),
( وّبkam ), ( ِزىmat ), ( عّّبamm ).
50
The Third Rule
[On the Length of Cryptanalysed Message]
52
I have also cryptanalysed, on the spot, the poetical interpretation of
ibn al-Bi r q al-W si al- ill :
Verses:
ibn Adl n is well-informed in syntax and
cryptanalysis. He's a universal scholar.
These two verses, though of the brachycatalectic light metre
- ma z ' al- af f -, may be looked at as one verse of the long metre
- al- aw l -, seeing that their sum total of letters adds up to forty-seven.
To be noted is that a verse of the long metre may consist of as many as
fifty-nine letters. An example of this is the following verse of my
own:
Verse:
A virtuous man spends his life seeking
an honest living. He's righteous in weal and woe.
Furthermore, I have broken what had been interpreted specially for
me, with no-word-spacer by Al ibn Muwaffaq ad-D n ibn Ya
al-Na w :
Verses:
Look into what I wrote,
for you are skilled in cryptanalysis.
54
In general, if you wish to cryptanalyse an interpreted
[enciphered] text, set down each type of letter symbols; then count all
the types, specifying the number precisely. Arrange types in clusters
of three orders according to their being abundant () ( ا, (l), َ (m), etc.
respectively), common (( هr), ) ( ع, etc.), or scarce letters () ( ؾ, ) ( غ,
) ( غ, etc.). Next, look for two-letter words and three-letter words, and
consider their frequency order, relating each one to its respective
order, such as: ْإ, ِب, ِٓ, عٍى, إٌى, trying to approach their signification
now by checking up on orders, now through their suitability to the
expected meaning, until the message makes sense, or else you try over
again, substituting for what you first guessed to be ) ( اthe letter ( يl)
and for what you guessed to be َ (m) the letter ( يl), and so with the
rest until all seven abundant letters are exhausted. Then you move to
the common letters, of which you start looking, first of all, for the
letters: ( دt) and ( نk), since their frequency of occurrence exceeds
that of other common letters, especially when used with the second
person, such that they often tend to go with the abundant letters. Then
you consider the letter ( هr), etc. to the last of common letters. You do
the same with the scarce letters, exercising exchange among letters, as
you did with the abundant letters, seeking to obtain intelligibility. If,
in one word, two or more letters remain intractable they are traced
back individually to the scarce letters, and thus forming meaningful
words. You do this over and over again, changing letters, until the
word comes right.
56
The Fourth Rule
[On Spacers]
This rule should have more rightly been marked the first. It treats
of the word-spacer –the symbol used to denote a blank between every
two words.
If the interpretation is "spaced" out using a unified space –i.e.
enciphering it by one symbol only-, cryptanalysis will be easier, and
can be accomplished in two ways: (a) through observing in the
cryptogram the symbol that is most recurring; and (b) through its
recurrence at intervals that are believed to bound words. Notice that
some words may be long, some others are short but of frequent
occurrence. (This point will be elaborated later on.) Take all that into
consideration. Then look into what you expect are the beginnings and
ends of words. Having arranged the (' اs), you are now fairly sure that
what you supposed to be a space is most likely so. Remember,
however, that a space is sometimes intentionally meant to be
concealed beside a letter that may be mistaken for a space. You had
rather give heed to that possibility. Examine the proximity of (before
and after) the space carefully and you will detect the word-spacer,
God willing.
On the other hand, if the variable space is used in the interpretation
[i.e. the space enciphered by several symbols], cryptanalysis gets very
problematical indeed. Some of those pursuing this method of
cryptography allege that their ciphers can defy detection and analysis.
I managed to solve several messages of this type that I was challenged
to solve, and also two other [encrypted] messages intercepted by some
kings. The first cryptogram I cryptanalysed was intercepted by His
Majesty King s , son of King Ab Bakr ibn Ayy b; the other for his
son, King an- i , who got hold of it from some frontiers.
58
The algorithm is to look for the symbol that you believe all-likely
to be ) ( ا. The following letter you assume to be ( يl). If the expected
) ( اis regarded as the first letter of a word, the preceding letter would
most probably be a space. Consider the feasibility of that in several
other places of the cryptogram. If not proved feasible consider the
letter following the assumed word-spacer, since the definite article ()اي
is liable to be preceded by one of four letters (to be tackled later). You
rely on word-beginnings, considering the ('اs) especially at front or
end positions of words, and assuming word-spacers anterior to the
first, and posterior to the last letters of words.
60
The letters ) ( اand ( يl) [i.e. the definite article], when enciphered
both using one form [i.e. one symbol], are even more problematic to
cryptanalyse. The algorithm (for cryptanalysis) is to look for one form
recurring at the beginning of words, and which you tend to think is
()اي. Then you look elsewhere in the cryptogram for the letter ) ( اand
for the letter ( يl) individually, and cryptanalyse them, assigning a
distinctive mark to the form representing either letter. Try then to
cryptanalyse the next, and guess its meaning through the way you
articulate the word in the light of the preceding and the following
context. Otherwise you look into the symbol itself. If the word
represented is a two-letter word, you try to hit it by analogy, matching
against similar instances in several places of the cryptogram until it
gets out.
You must also consider the letter ( يl) elsewhere in the cryptogram.
If a form is guessed to be ( يl), look into the form you have already
taken as ) ( ا. Any augmentation to the ( يl) form should be expected
as ( يl) of the definite article, as this would be more precise. I have
seen several forms such as this one, for example ( ) for the letter
( يl) and ( ) for the letter ) ( ا. Indeed I have seen this in many
ciphers. In addition, the variable space can be enciphered by several
symbols, such as the following calligraphs: ( ), ( ), ( ), and ( ).
Observe this carefully and you will find it out, Deo volente.
62
The Sixth Rule
On the Quantitative Identification of
Every Word with Definite Article
I tell you that any such word consists of at least two letters
[exclusive of the definite article], e.g. اٌني, ًاٌز, ّاٌّو, ّاٌجو, ّاٌوة, ّاٌؾت, ّاٌنه,
ّاٌشظ, provided that they are not suffixed by the letter ( يy). The
majority of these words are [seven] and eight-letter words, e.g.
ٍِٓصؽٍؾ, ِصؽٍؾبد, ٍَِٓزقوع, َِزقوعبد. A little less frequent are words
that do not admit the definite article, e.g. , which is a
ten-letter word. The rest may be either fourteen-letter words, such as:
٘بّٛأفجَزصالؽى, or eleven-letter words, which are really ample, such as:
بٙٔٛأرَزقوع, بٙٔٛرَزٕجؽٚ. These words will be found of great use in
educing word-spacers, such as in the case of the existence of
numerous forms that could mislead you as to believe it is not a word,
or the case of a space that you may have wrongly guessed. So keep
mindful, and do not neglect this rule; it is very rewarding in this
science; and the failure to master it is adverse to accurate
cryptanalysis.
64
The Seventh Rule
[On the Four Letters Preceding the Definite Article]
The letters preceding the definite article ( ايal) may be one of four
letters, viz., in descending order of occurrence: ٚ (w), ( ةb), ( نk), and
( فf). Thus a letter prior to the definite article must perforce be one of
them. You should think flexibly and look for identical elements
elsewhere in the cipher, seeking to acquire intelligibility and
coherence of meaning. Indeed, some cryptograms are unveiled this
way. On the other hand, two of the above letters may possibly precede
the definite article; for example the letter ٚ (w) and ( ةb) as in: ( ثبهللٚ);
or ٚ (w) and ( نk) as in: ( ّوبٌلّهٚ); or ( فf) and ٚ (w) as in: ( اهللٛ ;)فor
( فf) and ( ةb) as in: ()فجبهلل, which is the rarest.
Honorary titles [probable words] should have been the first rule to
mention. Since I forgot to do that in due course, I am herein
mentioning them. Examples of honorary titles include: In the name of
God, the Compassionate, the Merciful; in your name, my gracious
God (this was a common pre-Islamic opening); that which Allah
willeth will come to pass; all power appertaineth wholly to God; from
God I take my help; praise be to Him who deserveth praise; all favour
belongeth to God; God preserveth /helpth; my trust is in God; etc.
Such expressions, if used as openings of messages and identified as
honorary titles, will facilitate cryptanalysis beyond measure.
Similarly, there are such closing honorary statements as: God's
blessing and peace be upon our prophet Mu ammad and his folk, God
being willing, and Peace be upon you.
66
The Ninth Rule
[On Letters Occurring Initially in Words]
words, of a conjunction ٚ (w) and the letter ) ( اon the one hand, with
the letters ) ( اand ( يl), namely the definite article, on the other hand,
Verse:
Horsemanship, night, desert, and all know who I am.
Nay, manners, war, magnanimity and letters are among my qualities.
-= By the sun and his brightness, and the moon when she followeth
Also ambiguous are things like: ًٌٍٍ ثبand ًٌٍٍوب. Here you may
mistake ( )ثبand ( )وبfor the definite article, and thus you should keep a
good look-out thereat. In case of any ambiguity, apply the rules I have
told you and match against identical instances until you hit the mark,
Deo volente.
68
The Tenth Rule
On Letter Occurring Terminally [in Words]
Know that if the final letters of words were ('اs), the preceding
letters would most likely be ( '٘ـs), e.g. بٍِٙأوو, بٙإٔ٘ز, and, from the
his brightness, and the moon when she followeth-. So consider that.
Less likely, they could be (ْ's) such as: أووِٕب, عٍّٕب, and the following
Koranic verse:
against similar forms elsewhere in the cryptogram, and you are in line
70
The Eleventh Rule
On Compound Words of the Same Order
By this I mean a word with a letter repeated, and the repeated letter
could at times be the whole word, such as the repetition of the letter
" "اin the word آأٍغلof the Koranic verse: -
=Shall I fall prostrate before that which Thou hast created of clay?-,
which may be written with three 'اs ( 's). The repetition of two 'ةs
(b's) in one word is not common except in combination with the letter
( دt) signifying feminine gender. Examples: ( ثجّخbabbah: a sound/pet
name of a plump and healthy-looking boy or youth), ٌ( ككdad
(noun)=play(ing)), ٌٍْ ِ (sis: imperative of s sa=to manage). The
repetition may consist of two orders with a third element, e.g. ٍ( أآدi.e.
a deverbative noun derived from the verb at = to come + the
interrogative particle "hamza"),
( أإماi.e. i = if, when + the interrogative particle),
َ( أأىi.e. azza = to push + the interrogative particle),
ًَ( أأi.e. uss = base, foundation, groundwork + the particle),
َ( أآضi.e. a = to turn or become + the interrogative hamza),
َ( أأغi.e. a a = (of a camel) to groan under load + hamza),
ّ( أأفi.e. uff = expression of boredom or displeasure + hamza),
أأي,
َأأ,
ْأإ,
ٖ( أآi.e. h = expression of pain or agony + hamza),
ٚ( أأi.e. aw = or + the interrogative particle),
( أأيi.e. ay + the interrogative particle), etc.
72
For the case when the two repeated orders were 'ةs (b's), followed
by other letters, here are a few examples: ٍثجذ, ٍثجش, ٍثجـ, ٍثجل, ٍثجو, ٍثجي, ٍثجط,
ٍثجػ, ٍثجك, ًٍثج, ٍُثج, ًٍثج, etc. I have dilated much upon this point in my book
al-mu lam, which I wrote for al-Im m al-Mustan ir, peace be on his
soul.
another letter in between –i.e. the letter doubled- : ٌال, ٌٍُ, هلل, ٌٍٛ, ًٌٍ, ٌٍٓ
common use. Also: ِّّب, ًِّّ, َِّٓ, اٚٚ, يٚٚ, يٚٚ, ٌٍٓ20, ًََْٕٔ (derived from
"to obtain"), ََُْٕٔ (from "to sleep"), ََْٕٗٔ (from "to prevent"), ًٕٔ, ًُٕٔؽ21.
20
Name of a valley. This is the sole example in Arabic of a three-letter word, the
first and second letters of which being ()ي. (See Mu am al-Buld n 5/454).
21
Nun : from na (verb) = (a) to stretch out (rope, etc.). (b) to keep silent. The verb
na is a variant of = to give.
74
(B) with another letter in between: إال, أِب, أ٘ب, اٚأ, أٌب, أٔب, الي, ًٌّ, ًٌٙ,
ًٌٍ, ٍُِ, ُِٙ, َِٛ, ٍُِ, ّٓٔ, ٍَِٓٔ (from "to be lenient"), َُْٓٙٔ (from "to be low"),
ُٓٔئ, ٍٗ٘, ّٗ٘, ٖٛ٘, ٍٗ٘, ٚاٚ, ٌٛٚ, ٛ٘ٚ, ٛٔٚ, ًٌٍ, ًٌّ, ًٌٙ, ًٌٕ, ُّٓٔ (from "to
favor").
In some other instances you get a word in which the repeated letter
does not occur in succession with its fellow letter, but separated form
repeated but separated, with the letter َ" الlam" repeated in between-,
, , .
22
These examples, as a matter of fact, are not really illustrative of this case, but
rather of the one immediately preceding.
76
As for 23… …
And (ِّب, هلل, إٕٔبٚ, ًٕٔإٚ, اهللٚ, ٌٍُٙاٚ) and the like. Familiarity with these
repeated; examples: إما, أفب, أثب, ٓٔؾ, ٓٔى, ُِع, َُِ. Conversely, an
23
Text interrupted at this point, and a blank line follows in the original.
78
The Twelfth Rule
On Cryptanalysing No-Word-Spacer Cryptograms
24
By the two alifs is meant the terminal "hamza" of عبءand شبء, and the initial
"hamza" of آفوand َآك.
80
The word ( ككdad) is used in this verse with different senses: once
as a proper name of person in the vocative case, with the vocative
particle ( )ٌبomitted, and once as a name of particular place. Needless
to say, this is affectation.
This last-mentioned sense of the word (dad) appears in a verse
written by arafa ibn al- Abd -a first-rate pre-Islamic poet-:
84
The Thirteenth Rule
[On a Word's Initial Letter Repeated Twice]
This rule treats of the case in which individual words are obtained
by cryptanalysis, with a letter repeated twice at initial position of each
word. Except for a word like ْكك, the letter repeated must necessarily
be one of the following letters: ) ( ا, ( ةb), ( دt), ( فf), ( نk), ( يl), َ
(m), ْ (n), ( الl )25, or ( يy) no doubt. Awareness of this is really
useful and time-saving as it spares the cryptanalyst quite a lot of
brainwork. Thereupon you attend to the order of these double letters,
i.e. whether they are abundant, common or scarce, and work
accordingly. This applies when the characters of the cryptogram are
on a par with its letters.
25
Just so in the original; but considering that two consecutive ('الs) never occur
initially in an Arabic word, the double letter may correctly be (ٚ).
86
The Fifteenth Rule
[On Identical Vocables]
88
It should be pointed out that knowing the number of letters for each
metre makes access easier. Each of the two metres: a - aw l and
al-bas has a number of characters ranging between forty and fifty.
Should the characters be found forty, more or less, the metre would
probably be one of the following metres: a - aw l, al-mad d, al-bas ,
al-k mil, al-w fir, perfect ra az, perfect ramal, perfect sar ,
al-munsari , al- af f, perfect mutaq rib …26 . Thirty characters or
thereabouts suggest brachycatalectic mad d, al-bas , square k mil,
al-w fir, al-haza , ar-ra az, ar-ramal, as-sar , al- af f, al-mu ra ,
al-mu ta and al- mutaq rib. If the number is found a little upwards of
ten characters, this indicates certain varieties of poetical metres, such
as the curtailed munsari and ra az. No less than two-unit lines are
ever heard to have been said by Arab poets. An example from
al-munsari :
Verse:
Was there a sense of amiability,
when they met in Solaf.
And from ar-ra az:
Verse:
If only I were a youth,
to jump and disport myself.
26
A space occupied by an illegible word in the original Arabic manuscript.
90
In fact a one-unit verse was developed at a later stage to
demonstrate that the existence of rhyme letter in every unit is not
impossible. At no time has the one-unit verse been inherent in Arab
poetical measures. Examples:
Verse:
How splendid the moon is.
What an early rain that
lend life to humans.
(Salm al- sir)
Verse:
His vision came over
apace from far away.
(ibn al-Muna im)
Verse:
Your abandonment took away
sleep from my eyes.
(My own inditement)
To the best of my belief, drawing on poetic metres does not help
further in cryptanalysis beyond this limit.
92
The Seventeenth Rule
[On Rhyme]
27
Readers interested in deeper and more detailed treatment of rhyme in poetry are
referred to ibn Dunayn r's treatise Maq id al-fu l al-mutar ima an all
at-tar ama; sheets 71/B-72/A.
94
The relief letter -ridf-, can lend further guidance to cryptanalysis.
This is the letter immediately prior to the rhyme letter, provided that it
is one of the three letter: () ( ا, ٚ (w), or ( يy)). Examples: ( ٌغٍت ؽجٍت,
ة لعٍتٚٔن, )هلبة لجبة. You realize the letter ) ( اwhen enciphered
independently of any other letters, but it may assume different
representation when it occur in connection with another letter. For
example, the ال- i.e. ا+ ي- in the word ( )ؼالةmay sometimes be
represented by a single character. The letter ٚ (w) and ( يy) may be
used either deliberately or haphazardly. Other letters may occur of
necessity. That is why you should take particular heed when in doubt,
and check up on similar instances as the case may be.
As for the other "ridf" letters, i.e. (ٚ (w) and ( يy)), the target letter
may be either of them, or other letters like ( ال+ )ا, as in (ىالي, )علاي.
The benefit of this distinction is obvious in this art, as it limits the
range of choices exclusively to these two letters, ruling out other
possibilities. Such being the case, you consider similar instances in the
poetical cryptogram, and thereof seek articulation according to
context.
The so-called basal ( )ا-alif at-ta's s- is another parameter actively
promotive of cryptanalysing poetry. In the word اٌّؽبٌتof the
following second hemistich:
the letter ) ( اis basal, the letter ( ةb) is the rhyme letter -raw -, and
the letter ( يl) extraneous. Examples of the kind show the letter ) ( ا
being mostly basal, whether deliberately or haphazardly. The
following verse, written by ibn al- u ayn in Damascus, God
safeguard it, is a case in point:
96
Here the letter ( قq) in the words ٗاللؽ, ٗ رَبلؽmay be misconstrued
as basal, the letter ) ( غextraneous, and ( ٘ـh) the rhyme letter; but not
so. Actually the letter ) ( اis the basal letter, ) ( غthe rhyme letter,
( قq) extraneous, and ( ٘ـh) linkage. You act in the light of the
mainstream of the so-far cryptanalysed part of the cryptogram, and
single out the letter ) ( اtherefrom. This is very useful in the
cryptanalysis of poetry.
You should also be aware of the fact that several forms with
common features may be found at the end of a verse. For instance:
Here we have four letters in one word - بٍِٙؾ, بِِٙمب, etc.-. The first
will most likely be ) ( ا, and so will the last form, of necessity. You
also expect that the letter immediately preceding the last ) ( اwill
probably be either ( ٘ـh) or ْ (n), as you have already known. You
then work on the rhyme letter "raw ", trying to elicit it by means of
matching up with identical forms. There may be minor differences
concerning the first letter, as you have seen with ( ٗ )اللؽabove. Try to
understand that! It is really worthwhile, and remember that it is the
first that you have to work on.
98
The Eighteenth Rule
Preliminaries to Cryptanalysis
Know that the cryptanalyst embarks on an arduous task indeed.
TWO-LETTER WORDS: Each letter of a two-letter word is to be
reiterated twice in the alphabet. The first letter is unfolded by the agency
of the algorithms already covered, and the other is sought through
checking against every letter of the alphabet, and so taking up that makes
sense and ruling out that does not.
Example: In the word ( " )ِبm ", having cryptanalysed the ) ( ا, you
now experiment with every letter of the alphabet thus: ثب, رب, صب, …etc.,
guided by similar instances, and correcting the meaning until you score a
success; and it did happen that two-letter words were worked out this
way.
THREE-LETTER WORDS: If all three letters of a three-letter word are
unknown, you try to cryptanalyse one of them following the algorithms
previously mentioned, otherwise you try to find out whether one letter of
the three-letter word agree -in form- with an already cryptanalysed letter
from another word. If that is the case, you examine the two remaining
forms and see whether either of them agrees with the form of letter just
solved.
(a) If so, the only remaining letter you now check against the alphabet,
letter by letter, and adopt the one that proves intelligible, considering
identical and similar instances from other words in the cipher, until it
turns out well.
(b) If not, you look for similar instances elsewhere in the cryptogram,
and work out the unsolved letter in the light of those already solved.
You then combine the so-far known -i.e. cryptanalysed-with the
expected; the expected with the uncertain; and the uncertain with the
wildly or remotely guessed. The rest are identified against the letters of
the alphabet individually, by which means intelligible letters are singled
out and adopted. Other three-letter words are measured by the same
standard as before. Having found the expected in coherence with the
known, all will come out at once.
FOUR-LETTER WORDS: The algorithm for cryptanalysing these words
is basically no different from that used for three-letter words; i.e.
deducing the unknown from the known, the uncertain from the expected,
and the wildly guessed from the uncertain. Bear in mind that your aim
should always be comparing similar cases towards cryptanalysis.
100
The Nineteenth Rule
[On the Letter (" )يy" at the End of Words]
The letter ( يy) is copiously used in Arabic with verbs in the
present tense, e.g. ًِٕ( ٌىوto honor me), ًٌٍّٕع. (to inform me). When
you are at a loss in solving the letter ) ( ا, you have wrongly solved it
as ( يy), upon which case I have happened more times than one. In
addition, when you have cryptanalysed a terminal ( يy) in a no-word-
spacer cryptogram, the letter immediately preceding will most likely
be ْ (n).
102
Conclusion
Practice and Exercise
104
I counted the figures and they were 19 in all. I fixed the number of
times each figure was repeated; the subtotal numbers were as follows:
Bird Frequency Bird Frequency
pigeon 5 times crow 3 times
dove 6 falcon 3
hoopoe 11 sparrow 2
saker 13 ringdove 4
hawk 18 roller 3
bu 3 nightingale 1
magpie 3 blackbird 2
grackle 2 crane 1
eagle 5 bat 2
lark 16
When I set out to cryptanalyse the space [between words], the word
"saker" entertained my mind first, but I soon dismissed this possibility
when I looked at the last figure in both lines, to find "lark", preceded
by "saker". My argument was based on the fact that ( الl ) very rarely
occurs at the end of a verse as an independent word, but as part of a
longer word there. So I switched over to "lark", but my assumption
was also falsified when I found 19 letters right from the beginning of
the first line to "lark", as an Arabic word all that long does not exist. I,
therefore, shifted again to "hawk" and it came home to me that from it
right to its fellow figure can be a word. On that I worked. Then I
examined the letter ) ( اand held that it would probably be "dove";
thereupon I took up the tow-letter word which was "dove hoopoe",
i.e.( ِٓ); "grackle dove", i.e. ( ُ ;)صand "dove hoopoe", i.e. ( ِٓ) again.
Now I felt more inclined to believe that what I guessed ( ِٓ) and ( ُ)ص
were (ْ )أand ( )ِبrespectively. On closer examination it presented
itself to me as ( )إٔٔبand I felt almost confident of it being the intended
word. I carried on my verification a step further by scrutinizing what I
branded (ْ)أ, and found it had the characteristic of ( ِٓ) in both lines.
Then I considered ( ًٕٔإٚ) and gradually confirmed my belief that it
was really ( )إٕٔبno doubt.
106
I moved on to consider "crow", and had the impression that it
might well be the letter ٚ (w), as it is one among several possibilities
in common use, namely, ( ًٕٔإًٕٔ فإًٕٔ وإًٔٔ ثأٚ), with the ٚ (w) more
frequent in this position. I elaborated that. Then I traced the definite
article ()اي, and spotted nothing but "roller" at the end of the line, with
two counterparts: the one in (الٚ), the other in ( بٍٍٙ)ع. That it might be
( يl) did not cross my mind then. In order to support my assumption I
pondered "crow roller lark", out of which was drawn (الٚ). This turned
the scales in favour of ( يl) after it had seemed at first a mere figment
of the imagination. So far, all the figures of the word ( )اٌلٍٔبwere
solved save "falcon", which I studied intently by scanning against the
letters of the alphabet. I got the word ( )اٌلٍٔب, and thus it came right for
me. My initial impression had all the time been that the poem had a
relief letter,28 but this notion soon faded out when I cryptanalysed the
letter ) ( ا. Having verified that, I looked into the component letters of
the word ( ئلٔبٚ) –all of them had already been solved, but they did not
make sense to me, as the predicate of (ّْ )إnever links with its subject
by means of the conjunction ٚ (w) nor by any other conjunction. This,
again, made against my previous assumption. I made a third attempt
on those fragments already solved, and so I reconsidered ( )أؽٍب, of
which only "bu " was still covert. I matched this with the letters of
the alphabet and drew the following words: أثٍب, which is meaningless;
أرٍب, أصٍبand أؽٍب, which are all meaningful; also أٍٍبand أعٍب. Of these
words I had my heart set on أؽٍب, and so tried to verify its suitability by
matching against its counterpart in رؾٍب. The figures "pigeon" remained
concealed, which I matched against the letters of the alphabet, and the
word رؾٍبgot out. I sought the genuineness of the letter ( دt) in it, and
so had recourse to the beginning of the verse to find "pigeon" as the
first and final letters, with َ (m) and ْ (n) solved, while َ (m) still
unsolved. I had already had the impression that "dove" represented the
letter َ (m), and my belief was confirmed on the spot when I uttered it,
and it made sense.
28
-Refer to rule No 17 for ibn Adl n's definition of the relief letter.-
108
I then moved on to the word ( ً)ؽج, of which only the letter ( ةb)
was left unsolved. I checked it against the alphabet, and the word
stood for the letter ( ةb). To do that I considered its identical figure in
the words ( )ثضٍٕخand ( )ثَبعخ, and reflected on that for quite a while, but
to no avail as yet. I left it over to the word ( )كٍٔب٘ب, of which all letters
were then known except the letter ( ٘ـh). I came away with it
warranted my belief a fortiori that ( ٘ـh) should have been the choice
the alphabet, and thereby the word ( )ثضٍٕخgot out. All this I did without
110
Now I looked into the remainder of the other line. My failure at
first to solve the word ( )فزوععin it induced me to switch over to ( بٍٍٙ)ع.
Upon identifying "ringdove" against the alphabet I got ( بٍٍٙ)ع. I made
another attempt at the word ( )فزوعع, again unsuccessfully. I turned
over to the word ( )ثَبعخ, of which only "crane" was still hidden, i.e.
the letter ً (s). I matched it against the letters of the alphabet, and the
word ( )ثَبعخmanifested itself. I did the same with the word ( بٍّّٙ)ظ, of
which "bat" being the sole unknown figure. Afterwards I turned to the
word ( )هظٍذ, with the figure "blackbird" being still unsolved, and set
it to the touchstone in order to bear out the authenticity of my
cryptanalysis of ( بٍّّٙ )ظabove. I matched "blackbird" against the
alphabet, and the letter ( هr) appeared. Again, in the interest of
verification, I considered the beginning of the other line, of which the
figure "nightingale" was still close, matching it against the alphabet.
The word ( )فزوععgot out, and rightly so, for it comports with the
general purport, in view of the conceptual relationship between the
two verses. Now that all the words of the cryptogram were practically
out, the word ( ئلٔبٚ) developed in the light of the context as well as
from the dual-form usage necessitated by it.
Study that downright, use it in similar cases, and practise all that I
have made known to you; for this glimpse, I tell you, is of utmost
advantage in this field. May God favour your intentions, and may
good luck attend your steps at all times. Praise be to God, the Lord of
the worlds, and His blessing and peace be on our Prophet Mu ammad
and his noble household.
112
33
1
3 2
(1)
(2)
(3)
(4)
(5)
(6)
(7)
35
1
3 2
(1)
1230 627
644
1263 662
319 7 311 5
(2)
(3)
(4)
(5)
106 105
213 1
37
1
(1)
(2)
(3)
206 1
39
1
4 3
(1)
(2)
(3)
(4)
41
1
(1)
(2)
(3)
(4)
132 79
49
43
1
)(1
282
٘370ـ 981 895 ٘ـ
1967
311 5
)(2
1007 ٘ 398ـ
1066 ٘ 458ـ
264 4
)(3
)(4
416
30 11 1025 ٘ـ
45
1
(1)
(2)
(3)
(4)
47
1
(1)
49
1
4 3
(1)
(2)
(3)
154 2 82 28
(4)
51
1
(1)
(2)
1125 519 1037 428
117 7 10 8 14
(3)
(4)
207 6 65 1
41 1 269 46
236 487
53
1
3 2
(1)
1129 523
1204 600 596
141 8
(2)
(3)
970 360
168 167 7
(4)
(5)
1245 643
256 13 206 8
55
1
(1)
(2)
(3)
57
1
4 3
(1)
(2)
1227 624 1180 576
108 107 5
(3)
1145 540
1218 615
(4)
1206 603
1258 656
334 2
59
1
(1)
(2)
61
1
(1)
(2)
(3)
63
1
3
(1)
(2)
(3)
28 11
(4)
65
1
(1)
(2)
(3)
67
1
2
4 3
(1)
324
85 2
369 3
(2)
3 1 91
(3)
(4)
69
1
2
(1)
(2)
286 2
71
1
(1)
61 17
(2)
(3)
(4)
73
2 1
3
4
6 5
7
)(1
)(2
)(3
٘ 660ـ 1262
)(5
454 5
)(6
)(7
75
2 1
(1)
380 4
(2)
(3)
77
1
3 2
(1)
99 99
(2)
372 3
(3)
79
1
(1)
(2)
(3)
(4)
1130 524
1202 599
167 6 212 4 136 135 2 167 141 12
81
2 1
(1)
(2)
(3)
60
225 3
(4)
11 3
109 2
(5)
83
1
(1)
(2)
(3)
111
85
1
(1)
87
1
(1)
(2)
220 8 3
(3)
89
1
(1)
(2)
152
(3)
117 116
73 3
91
1
2
3
4
)(1
802 ٘186ـ
111 110 3
)(2
160 1 263 2
)(3
912 300
)(4
263 2
160 1
93
1
3 2
(1)
(2)
(3)
(4)
95
1
(1)
(2)
(3)
1230 2
97
1
(1)
200
91 359 517
99
1
(1)
101
103
2 1
5 4 3
(1)
(2)
(3)
(4)
(5)
(6)
(7)
105
1
(1)
(2)
107
1
(1)
109
111
113